tag:blogger.com,1999:blog-6322916946732811685.post752466544252834737..comments2024-03-29T09:14:34.373-04:00Comments on Borepatch: There really is no "Dark Net"Borepatchhttp://www.blogger.com/profile/05029434172945099693noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-6322916946732811685.post-26565970018242631332017-08-03T10:53:13.162-04:002017-08-03T10:53:13.162-04:00Um... there is a "dark net". It is acce...Um... there is a "dark net". It is accessed via IP tunneling (VPN) over ports that some firewalls don't close by default, or via packet interception/transmission code on modified systems (catching a packet with a specially-constructed header and pulling it out of the network stack before sending it on to the designated port, or injecting a "legitimate" packet with a modified header directly into the output stream at L3 or L2).<br /><br />Some "black hats" aren't script kiddies playing in their parents' basements. Some are damned good engineers... and they know every bit about what they're doing.<br /><br />I'm sure Mr. Dingledine knows this, and he's using naive journalists (is there any other kind?) to hide the existence of the dark net.Eaglehttps://www.blogger.com/profile/14471264704254326723noreply@blogger.comtag:blogger.com,1999:blog-6322916946732811685.post-19843569756076362042017-08-01T08:26:55.034-04:002017-08-01T08:26:55.034-04:00I don't really believe that there is anything ...I don't really believe that there is anything that the NSA can't and hasn't cracked. So expecting anything to protect me from government spying is not something I do. <br /><br />As for credit cards, meh. The banks are on the hook for that. I take reasonable precautions like reasonably complex passwords and reconciling my statements but I don't worry too much. Debit cards, however are dangerous and should only be used in controlled circumstances. Richardhttps://www.blogger.com/profile/13416410052064018322noreply@blogger.comtag:blogger.com,1999:blog-6322916946732811685.post-85477471682140279462017-07-31T19:25:17.660-04:002017-07-31T19:25:17.660-04:00When I switch on my computer and log-in, my second...When I switch on my computer and log-in, my second action is to start up my TOR browser. All my email is via TOR, all my browsing, all my on-line purchasing ... all my internet activity is via TOR.<br />My <b>first</b> action is to log in to my VPN which not only allows me to choose from which country I am operating, it also encrypts everything to and from my computer. And I am still very careful about what information I release. I have one credit card for internet purchasing and every couple of months I 'lose' that card. One phone call and I have a new card with different numbers in hand, free of charge to me.<br />So far, so good as far as I am concerned. Thanks TOR. selsey.stevehttps://www.blogger.com/profile/12531315051208210724noreply@blogger.comtag:blogger.com,1999:blog-6322916946732811685.post-4578470154217729252017-07-31T17:57:04.856-04:002017-07-31T17:57:04.856-04:00Really interesting perspective. I just wish I kne...Really interesting perspective. I just wish I knew if it was right. SiGraybeardhttps://www.blogger.com/profile/00280583031339062059noreply@blogger.com